Channel Avatar

Motasem Hamdan | Cyber Security & Tech @UCNSdU_1ehXtGclimTVckHmQ@youtube.com

0 subscribers - no pronouns :c

Motasem Hamdan is a content creator, instructor, swimmer and


35:49
Anti Reverse Engineering | How Hackers Make Malware Undetectable & Difficult to Analyze | TryHackMe
22:19
How to Use SQLmap to Test for SQL Injection Vulnerability | Full Tutorial
51:44
Nmap Complete & Full Course | Scanning Networks & Vulnerabilities | OSCP
01:57:21
How to Scan For Vulnerabilities | FREE Short Course
01:41:51
FREE Short Course | Network Packet Capturing & Analysis with Tshark
01:26:43
FREE Short Course | Log Analysis & Management: Windows & Linux
15:01
This Finance Company Got Hacked | TryHackMe Friday Overtime
01:53:41
FREE Short Malware Analysis Course
37:35
Malware Analysis with Ghidra | TryHackMe Advanced static analysis
50:11
FREE Assembly Programming Language Short Mini Course | Learn Assembly in an hour
31:04
How to catch corporate spies | SMB Packets Decryption | TryHackMe Block
01:40:42
FREE Wireshark Mini Course | From Beginner to Advanced in Under 2 Hours
17:01
Kerberos Attacks Explained | Windows Active Directory Attacks
01:51:33
Incident Response in Cyber Security Mini Course | Learn Incident Response in Under Two Hours
01:46:19
Free OSINT Mini Course | Learn OSINT in Under Two Hours
35:24
Pyramid of Pain in Cybersecurity Explained Practically | TryHackMe Summit
15:24
Wireless Vulnerabilities in Practice | WPS Pixie-Dust Attack Explained
30:54
Incident Response in Cyber Security | Identification & Scoping Phase | TryHackMe
12:28
How Can Stored XSS Vulnerability Lead to Cookie Stealing? Practical Training Scenario
25:58
Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation
21:12
Practical Purple Team & Log Analysis | TryHackMe Atomic Bird Goes Purple
32:45
NoSQL Injection Attack Explained | TryHackMe NoSQL Injection
17:32
Linux Ransomware Analysis with Ghidra & Any.Run | Malware Analysis
49:58
Complete Guide to Threat Emulation Using Caldera | TryHackMe CALDERA
14:25
How to Use Python to Decrypt Data | TryHackMe W1seGuy
47:22
Security Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red Team
37:41
Introduction to Threat Emulation | TryHackMe Intro to Threat Emulation
49:46
Ransomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo Squatters
46:39
A Company Got Hacked Because of an Invoice | TryHackMe Hunt Me 1: Payment Collectors
15:52
Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets
15:09
Android Reverse Engineering Basics | Part 1 | React Native Applications
33:59
How We Used Elastic Search To Hunt APT29 Hackers | TryHackMe Threat Hunting EndGame
23:41
How We Used Python to Hack GDB Servers | TryHackMe Airplane CTF
19:58
Linux Logs Analysis Case Study | Detecting SSH Brute Force Attacks
32:43
Network Forensics with Powershell | TryHackMe Windows Network Analysis
37:31
Live Linux Forensics | Processes & Cronjobs | TryHackMe Linux Process Analysis
01:09:34
Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting
16:46
Loki Locker Ransomware Detection & Analysis | Windows Events Logs Analysis
01:20:56
Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold
16:19
Windows Privilege Escalation with Metasploit | Shockingly Easy ! | TryHackMe CyberLens CTF
15:16
How To Use Aurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDR
38:58
How To Use Threat Intelligence To Prevent Cyber Attacks | TryHackMe Threat Intelligence for SOC
08:58
Craft CMS CVE-2023-41892 Vulnerability Exploitation | POC
34:54
How We Investigated a Hacked E-Commerce Website with Elastic Search | TryHackMe Slingshot
47:49
Ransomware Detection with Advanced Elastic Search Queries | TryHackMe Advanced ELK
16:39
PDF Malware Analysis with Volatility, Any.Run & VirusTotal
41:31
Wazuh SIEM Full Tutorial | TryHackMe Creating Custom Wazuh Alerts
58:18
How to Use Elastic Search & Logstash For Data Analytics & Cybersecurity | TryHackMe
32:06
How to Conduct Web OSINT with Wayback Machinev| TryHackMe WebOSINT
15:03
Open Source Intelligence Tools & Techniques Explained With Case Studies
26:51
How to Use Splunk SIEM for Logs Analysis & Events Monitoring | TryHackMe Fixit
18:09
How to Use Splunk SIEM to Collect & Analyze Web Server Logs | TryHackMe Splunk: Setting up a SOC Lab
41:02
Splunk Search Processing Language | TryHackMe Splunk: Exploring SPL
18:21
Dynamic Malware Analysis of Konni RAT Malware APT37 With Any.Run
39:37
Introduction to Logging & Logs | TryHackMe Intro to Logs
27:04
How to Scan and Clean an Infected Wordpress Website With Malware
35:28
Analyzing Cybersecurity Incidents with Zeek IDS | TryHackMe Zeek Exercises
11:14
Linux Privilege Escalation For Beginners | Nebula Exploit Exercises Walkthrough | Level 13-15-19
53:25
Linux Privilege Escalation For Beginners | Nebula Exploit Exercises Walkthrough | Level 01-12
52:20
BurpSuite Repeater | Sequencer | Encoder/Decoder | TryHackMe BurpSuite